Question :
- Challenges of BYOD to the IT network
- List of sources that demonstrate academic learning
Answer :
INTRODUCTION
BYOD stands for Bring your own device. This has been observed that almost all firms are enjoying lots of benefits through the introduction of this term in corporate world, as it has made their organisational chores so simple in nature (Webb, Ahmad, Maynard and Shanks, 2014). By implementing similar conception, companies are promoting or encouraging their staff members to carry on official work by utilising their personalised devices. The main motive of doing so is to increase entire degree of production along with reduction of gross costing regarding investment. On the other hand, there is also a dark face of BYOD like threats associated with IT security might occur. The present report is designed for highlighting the two main challenges of this similar concept related to IT network.
MAIN BODY
The introduction of construct like Bring – your - own - device is acting as an angel for all corporations which are existing all over world since it is helping in enhancing productivity. But some of the antagonistic effects are also recognised regarding this (What is BYOD and why is it important?, 2017). This can be better understood by examining below mentioned points :
Emergence risk affiliated with Information technology : When particular enterprise suggest its team members to bring their own devices or systems for performing business activities, then it may enhance the danger in context to computer safety (Martins, Oliveira and PopoviÄ, 2014). Some of the employees at the time of utilising their own systems might found to break firewalls or other encryption system. This may put company into great risk in current as well as upcoming days. In addition to this, workers might also give rise to complications for entire commerces by enforcing or executing any risky software within computer system.
Also read: The Speaker’s Tone In “Harlem” Is Best Described As
Leakage of confidential data : This has been identified that cases connected with leaking of sensitive information from corporations are touching the height of sky. Since ventures are inspiring work – forces to conduct commercialized chores at work – station by brining personal gadgets like mobile-phones, laptops and so on; personnels have been engaging themselves into carrying out unfair works for attaining much more benefits (Schwalbe, 2015). For instance, they are identified by sharing important data or info to other individuals who are not part of current business. This in turn impacting venture into negative ways. Frauds happening on online websites like thefts, robberies, hacking, etc. are treated as best example of this kind of activity as few employee used to transfer private information associated with email, bank accounts and many more to specific intruder. Thus, those people easily hack accounts of customers as well as higher authorities of any organisation in order to acquire required facts & figures as per their requirement. These all things are effecting overall reputation of particular enterprise since users may not trust on those ventures and avoid taking use of their services.